Home Search

remote work - search results

If you're not happy with the results, please do another search
BrakTooth Flaws

Millions of Bluetooth Devices Affected by BrakTooth Flaws

0
Bluetooth technology (BT) has encountered severe scrutiny due to various design flaws and vulnerabilities. Security experts from the Singapore University of Technology and Design...
CISA vulnerabilities, Zero-Day Attack, zero-day vulnerabilities, Apple

Hackers Target Microsoft Office Users in a New Zero-Day Attack

0
Researchers uncovered active exploitation of a zero-day remote code execution vulnerability in the main HTML component of the now-discontinued Internet Explorer browser. Microsoft warned...
ransomware, fonix, fonix ransomware, Cybereason Partners with Intel for Hardware-Enabled Ransomware Prevention, Kronos

Ransomware Vulnerabilities That Could Bring Down Your Organization

0
Today, 266 vulnerabilities are associated with ransomware, and attackers are increasingly exploiting these weaknesses to launch devastating ransomware attacks. Therefore, identifying and remediating these...
Ransomware attacks, ransomware, Sinclair Broadcast group

Ransomware – What is new?

0
Executives are worried.  They see organizations crippled by ransomware, often for days or weeks, and rumors of multimillion-dollar fines being paid. By Ian Mann, CEO...
Hive Ransomware

FBI Raises Red Alert About Hive Ransomware Group

0
Authorities from the FBI are warning about a new ransomware group, tracked as Hive, which was behind the recent attacks on multiple health care...
Surveillance Legislation (Identify and Disrupt) Amendment Bill

Australia Passes Surveillance Legislation (Identify and Disrupt) Amendment Bill 2020

0
Australia is constantly trying to boost its cybersecurity capabilities to mitigate rising threats of remote access scams and identity thefts. The government recently passed...
Black Kingdom ransomware

Cybercriminals Entice Employees to Deploy Black Kingdom Ransomware

0
In a new kind of insider threat campaign, cybersecurity researchers found a Nigerian cybercriminal group enticing unwitting employees by offering them a share of...
ProxyShell Vulnerabilities

Unpatched Microsoft Exchange Servers Under ProxyShell Attack

0
While organizations are battling to boost their cybersecurity capabilities, cybercriminals continue to prey on security loopholes. Active exploitation of unpatched vulnerabilities has become a...
types of ethical hackers

Different Types of Ethical Hackers: White, Black, and Grey Hats Explained

0
There are several types of ethical hackers depending on the hacker’s intent and goal. This article highlights the concepts of hacking and the different types of...
Privacy Enhancing Technologies

“Privacy Enhancing Technologies can allow organizations to pursue data sharing while remaining compliant”

0
If we were to participate in a Socrates seminar and deliberate on the importance of securing data, in unison, the response would be: Encryption,...